How to - Detect Fake Steam Logins

Hey guys, It's GoDLY-HaX here with a bit of a helpful threads for newbs, People who aren't familiar with hacking/VB, And people who are cautious and or don't want to have to buy a new game because some asshole (Excuse the language) went and made some fake ass program that resembles the steam default themed login form.

~ .::How to detect them::. ~

First off - If the form uses picture boxes rather than animated buttons. In other words. If you click the button and it does nothing but begin to start a function through the program. What this is is the coders pure stupidity and lack of knowledge and understanding of basic coding. Always Note: Try to login with a fake account first. If you need both an account name and password, Fill them out with fake information. If you click login, and the form loads up and works with this fake information, The "HACK/TRAINER" is total bullshit.

Second - Always Note: Almost Never, should any kind of hack/trainer ask you to modify/replace existing game files. If they do, You should be only need to use something like notepad or hex editor. If it is asking you to replace the steam.exe with another version of the executable, It's almost positively BULLSHIT

Third - Always, Always, Always, Always Note: Never Ever Ever Ever EVERRRRRR!!!!! Give your personal information to something that looks 100% fake. By doing this you are simply sending the information in the provided text fields to some fat ass sitting on his computer waiting for e-mails.

Fourth - Don't think that just because you scan a file and it's clean means you can toss your information in the login fields on the program. This will result in utter theft of your account.

Fifth - Key-loggers and account "HIJACKERS" are commonly mix matched and thought of as the same thing. Let me finish this section by providing you with details.A - Keyloggers are programs that hide themselves in memory files in your computers drive. Every time you execute a command inbound or outbound of computer, You are simply sending the command to the hidden file along with all the information in that command. This file is set on a timer, When the timer ticks, Sets, and then executes it's own command, it sends the stored information through your internet connection to some douche bags e-mail

B - Account stealing programs are different. They are set up using outbound e-mail commands. Some asshole makes an e-mail account (USUALLY USING GMAIL). Then opens the programs code and enters his e-mail's information
(MAIL NAME: example@example.com Mail Pass: Example) Eventually the code tells the program to send the information provided in (EXAMPLE - (Textbox1.text) & (Textbox2.text) )
To his e-mail at the click of Login (Button1.click)/(Picturebox1.click).
Last - How to disable someones phishing program very easily: Step one - Download their piece of shit program, Save to desktop.
google.com - Search [Download Hex Workshop]
DownloadStep 2. After you have Hex Workshop Installed, Right click the shitgram (PROGRAM USED FOR STEALING ACCOUNTS) click "Hex Edit With - Hex Workshop Version (Version here)

wow.... i rly wasnt expecting SO much feedback, as simple as this guide is i guess, well, its good. I've actually taken the time to look at it and wow, best thing I've released since my crosshair and rank hack. Thanks for the good FB